Date: Fri, 21 Jan 2000 09:56:17 -0700 From: Brett Glass <brett@lariat.org> To: Fernando Schapachnik <fpscha@via-net-works.net.ar>, bobm@atgsystems.com (Bob Madden) Cc: freebsd-security@FreeBSD.ORG Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? Message-ID: <4.2.2.20000121095431.01a23a90@localhost> In-Reply-To: <200001211120.IAA15446@ns1.via-net-works.net.ar> References: <000101bf63e9$76352f30$01000000@madman>
next in thread | previous in thread | raw e-mail | index | archive | help
A few hours after the exploit was announced, AT&T's backbone began to experience problems. A friend's site, connected directly to AT&T was down, and I couldn't even traceroute to him. Could be=20 coincidence, or it could be that someone was already aiming an=20 attack at some of those routers. Can't tell.... I doubt AT&T would confirm or deny. --Brett At 04:20 AM 1/21/2000 , Fernando Schapachnik wrote: =20 >Has anyone tried stream.c against CISCO, Nortel, etc. routers? > >Althoug off-topic, their (unofficial) vulnerability status would be=20 >very helpfull? > >TIA! > >En un mensaje anterior, Bob Madden escribi=F3: > > I'm grateful for the efforts put forth in finding a reliable means of > > prevention to this attack. I have seen it's effects. For the benefit of= those > > working on the solution, I wanted to share what I see when the attack is= in > > full swing: > >Fernando P. Schapachnik >Administraci=F3n de la red >VIA NET.WORKS ARGENTINA S.A. >fernando@via-net-works.net.ar >(54-11) 4323-3333 > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20000121095431.01a23a90>